Hi folks,
Here's an email I wrote to a researcher who is working on categorizing
anonymity attacks. I figured I should share it with you in case it's
useful in some way.
It's also related to my talk at
https://www.cosic.esat.kuleuven.be/ecrypt/provpriv2012/program.html
and I expect to use it as
On Wed, Sep 5, 2012 at 11:52 AM, David Goulet wrote:
> ... the problem of "bufferbloat" which is encountered in network
> bottlenecks.
>
> https://en.wikipedia.org/wiki/Bufferbloat
> http://www.bufferbloat.net/
yup. particularly bad at the edges...
> Anyhow, I looked around for some recent stud
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi everyone,
I discovered, during a presentation at this year LinuxCon in San
Diego, the problem of "bufferbloat" which is encountered in network
bottlenecks.
https://en.wikipedia.org/wiki/Bufferbloat
http://www.bufferbloat.net/
There is been a go